Denon ASD-3W - Digital Player Docking Station Owner's Manual Page 33

  • Download
  • Add to my manuals
  • Print
  • Page
    / 43
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 32
ENGLISH
~(Wi-Fi
Protected Accessl _
This
is a security standard established by the Wi-Fi
Alliance.
In
addition to the conventional
SSIO
(network
name)
and
WEP
key
(network
key).
it also uses a user
identification function
and
encrypting protocol for
stronger security.
WPA2 (Wi-Fi Protected Access
2l
WPA-PSK/WPA2-PSK (Pre-shared
KeyL
This
is
a simple authentication system for mutual
authentication when a preset character string matches
on
the wireless
LAN
access point
and
client.
This
refers to the code
key
used for WPA-PSK/WPA2-
PSK
authentication, a WPA authentication method.
Passphrase
This
is a new version
of
the WPA established by the
Wi-Fi Alliance, compatible with more secure
AES
encryption.
TKIP (Temporal Key Integrity
ProtocolL
This
is
a network
key
used for
WPA.
The
encryption
algorithm
is
RC4,
the same
as
forWEP. but the security
level is increased
by
changing the network
key
used
for encryption for
each
packet.
AES (Advanced Encryption Standard)
This
is
a next generation standard encryption method
replacing the current
OES
and
30ES,
and
because
of
its high security it is expected to be applied widely
to wireless LANs
in
the future. It uses the "Rijndael"
algorithmdeveloped
by
two
Belgian cryptographers to
divide the data into blocks of fixed lengths and encrypt
each
block. It supports data lengths of
128,
192
and
256 bits
and
key
lengths
of
128,
192
and
256 bits
as
well, offering extremely high encryption security.
When forming wireless
LAN
networks, groups
are
formed to prevent interference, data theft, etc.
This grouping
is
done
by
"SSIO" or "Security Set
Identifiers
':
For
further security, a WEP
key
is
set
and
signal transfer
is
not possible unless the
SSIO
and
WEP
key
match.
Network
Names
jSSID: Security
Set
Identifier)
Signal transfer through wireless interconnection
of
computers is referred to
as
"ad hoc communications':
With such
ad
hoc communications there is no
connection to the Internet.
Ad
hoc communications
are
suited for establishing simple temporary networks.
Ad-hoc Communications
WEP Key (Network Key' _
This
is
key
information used for encrypting data when
conducting data transfer.
On
the AVR-4308, the same
WEP
key
is
used for
data
encryption
and
decryption,
so the same
WEP
key
must
be
set
on
both devices
in
order for communications to be established between
them.
Wi-Fi Certification assures tested
and
proven
interoperability
by
the Wi-Fi Alliance, a group certifying
interoperability among wireless
LAN
devices.
This
is one wireless LAN standard set
by
the 802
working group that establishes
LAN
technology
standards at the
IEEE
(Institute of Electrical
and
Electronics Engineers)
of
the United States. It uses the
2.4
GHz
band usable freely without a radio frequency
license (ISM
band).
enabling communications at a
maximum speed of
11
Mbps.
IEEE
802.11 b
The
value
indicated above
is
the maximum theoretical
value for the wireless LAN standard,
and
does not
indicate the actual data transfer
rate.
1i...
........;.....
.....
_
............................
_
............
_
.......
~
....1 Infrastructure Communications
:
About
Wir~les$
LAN
, "Infrastructure Communications" refers to networks
using wireless
LAN
access points.
W.
"-F·.@
This function
can
be
used to connect to the Internet or
a wired
LAN
via
a wireless
LAN
access point. Wireless
LAN
access points include wireless broadband
routers.
IEEE
802.11g
This
is
another wireless
LAN
standard set
by
the
802
working group that establishes
LAN
technology
standards at the
IEEE
(Institute of Electrical
and
Electronics Engineers) of the United States,
and
is
compatible with
IEEE
802.11b. It also uses tne 2.4
GHz
band,
but enables communications at a maximum
speed of
54
Mbps.
The
value indicated above
is
the maximum theoretical
value for the wireless
LAN
standard,
and
does not
indicate the actual data transfer
rate.
24
Page view 32
1 2 ... 28 29 30 31 32 33 34 35 36 37 38 ... 42 43

Comments to this Manuals

No comments